Method for network communication past encryption devices

    公开(公告)号:US09887974B2

    公开(公告)日:2018-02-06

    申请号:US14931620

    申请日:2015-11-03

    CPC classification number: H04L63/0471 H04L63/0485 H04L63/18

    Abstract: This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an encryption mechanism and the devices do not have the stand-alone capability to encrypt or decrypt the communication. According to these techniques, an adapter may determine certain fields in a data packet that remain unencrypted when the data packet passes through the encryption mechanism. The adapter may then process those fields in such a way that, when the data packets are received by a second adapter, the second adapter may read those fields and obtain information.

    CONTEXT-AWARE NETWORK AND SITUATION MANAGEMENT FOR CRYPTO-PARTITIONED NETWORKS
    13.
    发明申请
    CONTEXT-AWARE NETWORK AND SITUATION MANAGEMENT FOR CRYPTO-PARTITIONED NETWORKS 审中-公开
    针对分组网络的背景知识网络和状况管理

    公开(公告)号:US20150180830A1

    公开(公告)日:2015-06-25

    申请号:US14512123

    申请日:2014-10-10

    Abstract: This disclosure describes a context aware scalable dynamic network whereby network information concerning network elements in an untrusted (Black) network are gathered by network sensors, stored at a network sensor collector, and sent to another network sensor collector in a trusted (Red) network through a one-way guard. At the Red network, the network information from the Black network may be combined with network information from one or more Red networks. The combined network information may then be used to visualize a cross-domain network topology of both Red and Black networks, and to implement network management functions.

    Abstract translation: 本公开描述了一种上下文感知可扩展动态网络,由此网络信息由不可信(黑)网络中的网络元件收集,存储在网络传感器收集器处的网络传感器收集,并发送到可信任(红色)网络中的另一个网络传感器收集器 单程护卫 在红色网络中,来自黑色网络的网络信息可以与来自一个或多个红色网络的网络信息组合。 然后可以将组合的网络信息用于可视化红色和黑色网络的跨域网络拓扑,并实现网络管理功能。

    Secure authentication using biometric factors

    公开(公告)号:US10762183B1

    公开(公告)日:2020-09-01

    申请号:US15866046

    申请日:2018-01-09

    Abstract: In general, the techniques of this disclosure describe a computing device in a secure domain that is configured to receive, via a guard device, an authentication factor from a biometric authentication device in a non-secure domain. The biometric authentication device is in a non-secure domain, and the authentication factor comprises an identifier of a prospective user of the biometric authentication device. The computing device may then determine, based on the received authentication factor, whether the prospective user is a trusted user of the computing device based on the authentication factor. Responsive to determining that the prospective user of the biometric authentication device is the trusted user, the computing device may enable access to one or more applications on the computing device.

    Software credential token issuance based on hardware credential token

    公开(公告)号:US10715327B1

    公开(公告)日:2020-07-14

    申请号:US15992924

    申请日:2018-05-30

    Abstract: Embodiments for a method for issuing a software credential token with reliance on a hardware credential token are disclosed. A data server that allows access thereto via a set of hardware credential tokens is provided. The method includes receiving a request for a software credential token from a personal computing device. The request includes an indication of a hardware credential token upon which the request relies. An email address and a public key corresponding to the hardware credential token are obtained. The method also includes sending an email to the email address. The email includes a one-time password encrypted with the public key. Access to the email is restricted to an individual to which the hardware credential token was issued. The method also includes receiving an inputted password from the personal computing device. If the inputted password matches the one-time password, a software credential token is issued to a user.

    METHOD FOR NETWORK COMMUNICATION PAST ENCRYPTION DEVICES

    公开(公告)号:US20160057116A1

    公开(公告)日:2016-02-25

    申请号:US14931620

    申请日:2015-11-03

    CPC classification number: H04L63/0471 H04L63/0485 H04L63/18

    Abstract: This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an encryption mechanism and the devices do not have the stand-alone capability to encrypt or decrypt the communication. According to these techniques, an adapter may determine certain fields in a data packet that remain unencrypted when the data packet passes through the encryption mechanism. The adapter may then process those fields in such a way that, when the data packets are received by a second adapter, the second adapter may read those fields and obtain information.

    METHOD FOR NETWORK COMMUNICATION PAST ENCRYPTION DEVICES
    17.
    发明申请
    METHOD FOR NETWORK COMMUNICATION PAST ENCRYPTION DEVICES 有权
    网络通信过程加密设备的方法

    公开(公告)号:US20150149764A1

    公开(公告)日:2015-05-28

    申请号:US14165192

    申请日:2014-01-27

    Abstract: This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an encryption mechanism and the devices do not have the stand-alone capability to encrypt or decrypt the communication. According to these techniques, an adapter may determine certain fields in a data packet that remain unencrypted when the data packet passes through the encryption mechanism. The adapter may then process those fields in such a way that, when the data packets are received by a second adapter, the second adapter may read those fields and obtain information.

    Abstract translation: 本公开涉及用于在不同网络中的设备之间提供通信的技术,其中通信必须首先通过加密机制,并且该设备不具有加密或解密通信的独立能力。 根据这些技术,当数据分组通过加密机制时,适配器可以确定在数据分组中保持未加密的某些字段。 然后,适配器可以以这样的方式处理这些字段,即当数据分组被第二适配器接收时,第二适配器可以读取这些字段并获得信息。

Patent Agency Ranking